In the wake of the London Bridge attacks, Stella Rimington opened the Infosecurity Europe conference in London with lessons learned from her tenure as director general of Britain's domestic security service, MI5.
The WannaCry Ransomware is undoubtedly one of the worst cyber disasters to strike global businesses in years, crippling transportation and hospitals globally.
Download this eBook to learn how to be prepared to quickly address the growing threat of ransomware and limit your company's exposure to future...
In February 2016, hackers reportedly attempted to steal approximately 1 billion USD from the Central Bank of Bangladesh by exploiting weaknesses in the bank's security to infiltrate its system and gain access to computers with access to the SWIFT network. In February 2017, several Polish banks were...
A new Department of Health and Human Services report to Congress containing more than 100 recommendations for how healthcare can better address cybersecurity threats is stirring debate over whether smaller organizations will be able to take the recommended actions.
On the eve of Europe's biggest annual cybersecurity conference, and scores of interviews with some of the world's leading information security experts, I'm asking how the London Bridge attacks will change the tenor of at least some of these discussions.
The annual Infosecurity Europe conference returns to London this week, offering discussions of the latest information security practices, procedures and technologies as well as deep-dives into privacy, cybercrime, policing, surveillance, GDPR and more.
Outdated policies, lax regulatory oversight and bureaucracy have stunted more advanced cybersecurity investments at some organizations that provide the nation's critical infrastructure, says Brian Harrell, the former director of critical infrastructure protection at the North American Electric Reliability Corp.
Today's cybersecurity industry is far too focused on keeping bad guys out, says Chris Pierson of Viewpost. Organizations need to pay more attention to keeping data inside the enterprise, he says, describing how to make the shift to a focus on limiting exfiltration.
By some estimates, 70 percent of enterprise data still resides on the mainframe. That means mainframe security needs to be a hot-button cybersecurity issue, says Chip Mason of CA Technologies.
The latest ISMG Security Report focuses on evolving Russian cyber threats, including manipulating hacked documents as part of a disinformation, cyber-espionage campaign.
A recent speech by a health insurance company executive is stirring up debate about whether a patient's privacy can be violated even if the patient's name is never revealed.
Cybersecurity professionals believe that technology integration, collaboration between cybersecurity and IT
operations, and tight alignment between cybersecurity and IT operations frameworks are important components
for incident response performance. However, incident response has become more difficult over the past...
Detecting a breach can take months. Unable to quickly respond, organizations risk exposing valuable data and confidential information. The recovery process can be incredibly expensive and the damage to the business reputation incalculable.
Efficient response to security incidents is among the biggest challenges for...
Not a day goes by that there isn't another massive security breach in the news. Consumers have to deal with the emotional and financial aftermath of identity theft while name-brand retailers and enterprises are spending millions to respond, remediate, and recover from the theft of
sensitive customer data and...
Privileged systems and data are under the constant threat of attack. For most organizations, suffering a serious information security breach involving privileged access is no longer a question of if, but when.
Despite being aware of the threats, most organizations still allow a range of employees and third-party...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.